DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Russian National Indicted for Conspiracy to Introduce Malware into a Computer Network

Posted on September 5, 2020 by Dissent

One of the big stories this week concerned a failed attempt to bribe a Tesla employee to inject malware into Tesla’s system. The attempt failed because the employee reported what was going on.  From the U.S. Department of Justice:

A federal grand jury in the District of Nevada returned an indictment today charging a Russian national for his role in a conspiracy to intentionally cause damage to a protected computer.

Acting Assistant Attorney General Brian C. Rabbitt of the Justice Department’s Criminal Division, U.S. Attorney Nicholas A. Trutanich of the District of Nevada, and Special Agent in Charge Aaron C. Rouse of the FBI’s Las Vegas Field Office made the announcement.

The indictment alleges that Egor Igorevich Kriuchkov, 27, a citizen of Russia, attempted to recruit an employee of a company located in Nevada, with the purpose of introducing malicious software into the company’s computer network, extracting data from the network, and thereafter extorting ransom money from the company under the threat of making the extracted data public.

According to the indictment, from about July 16, 2020, to about Aug. 22, 2020, Kriuchkov conspired with associates to recruit an employee to introduce malware into the computer network of the employee’s company.

The malware would purportedly provide Kriuchkov and his co-conspirators with access to the data within the computer system. After the malware was introduced, Kriuchkov and his co-conspirators would extract data from the network and then threaten to make the information public, unless the company paid their ransom demand.

Kriuchkov was arrested on Aug. 22, 2020, in Los Angeles, California and had his initial appearance before U.S. Magistrate Judge Alexander F. MacKinnon of the U.S. District Court in the Central District of California.   Kriuchkov was detained pending trial and has not yet appeared in the District of Nevada.

An indictment merely alleges that crimes have been committed. The defendant is presumed innocent until proven guilty beyond a reasonable doubt.

The investigation was led by the FBI’s Las Vegas Field Office with assistance by the FBI’s Los Angeles and Sacramento Field Offices and the Washoe County (Nevada) Sheriff’s Office.  The case is being prosecuted by Senior Counsel C.S. Heath and Trial Attorney Thomas Dettore of the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S. Attorney Richard Casper of the District of Nevada.

The year 2020 marks the 150th anniversary of the Department of Justice.  Learn more about the history of our agency at www.Justice.gov/Celebrating150Years.

Category: Breach IncidentsMalwareOf NoteU.S.

Post navigation

← FBI issues second alert about ProLock ransomware stealing data
CNN-News18 allegedly hacked to deny PayTM hack claims →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines
  • Call for Public Input: Essential Cybersecurity Protections for K-12 Schools (2025-26 SY)
  • Cyberattack puts healthcare on hold for hundreds in St. Louis metro
  • Europol: DDoS-for-hire empire brought down: Poland arrests 4 administrators, US seizes 9 domains

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information
  • Georgia hospital defeats data-tracking lawsuit
  • No Postal Service Data Sharing to Deport Immigrants
  • DOGE aims to pool federal data, putting personal information at risk
  • Privacy concerns swirl around HHS plan to build Medicare, Medicaid database on autism

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.